Configure Microsoft Defender for Endpoint in Intune

Use the information and procedures in this article to configure integration of Microsoft Defender for Endpoint with Intune. Configuration includes the following general steps:

  • Establish a service-to-service connection between Intune and Microsoft Defender for Endpoint. This connection lets Microsoft Defender for Endpoint collect data about machine risk from supported devices you manage with Intune. See the prerequisites to use Microsoft Defender for Endpoint with Intune.
  • Use Intune policy to onboard devices with Microsoft Defender for Endpoint. You onboard devices to configure them to communicate with Microsoft Defender for Endpoint and to provide data that helps assess their risk level.
  • Use Intune device compliance policies to set the level of risk you want to allow. Microsoft Defender for Endpoint reports a devices risk level. Devices that exceed the allowed risk level are identified as noncompliant.
  • Use a conditional access policy to block users from accessing corporate resources from devices that are noncompliant.
  • Use app protection policies for Android and iOS/iPadOS, to set device risk levels. App protection polices work with both enrolled and unenrolled devices.

In addition to managing settings for Microsoft Defender for Endpoint on devices that enroll with Intune, you can manage Defender for Endpoint security configurations on devices that aren’t enrolled with Intune. This scenario is called Security Management for Microsoft Defender for Endpoint and requires configuring the Allow Microsoft Defender for Endpoint to enforce Endpoint Security Configurations toggle to On. For more information, see MDE Security Configuration Management.

Important

Microsoft Intune is ending support for Android device administrator management on devices with access to Google Mobile Services (GMS) on August 30, 2024. After that date, device enrollment, technical support, bug fixes, and security fixes will be unavailable. If you currently use device administrator management, we recommend switching to another Android management option in Intune before support ends. For more information, read Ending support for Android device administrator on GMS devices.

Connect Microsoft Defender for Endpoint to Intune

The first step you take is to set up the service-to-service connection between Intune and Microsoft Defender for Endpoint. Set up requires administrative access to both the Microsoft Defender Security Center, and to Intune.

You only need to enable Microsoft Defender for Endpoint a single time per tenant.

To enable Microsoft Defender for Endpoint

Open the Microsoft Defender for Endpoint portal at security.microsoft.com. The Intune admin center also includes a link to the Defender for Endpoint portal.

  1. Sign in to the Microsoft Intune admin center.

  2. Select Endpoint security > Microsoft Defender for Endpoint, and then select Open the Microsoft Defender Security Center.

    Tip

    In the Intune admin center, if the Connection status at the top of the Microsoft Defender for Endpoint page is already set to Enabled, the connection to Intune is already active and the admin center displays different UI text for the link. In this event, select Open the Microsoft Defender for Endpoint admin console to open the Microsoft Defender for portal. Then you can use the guidance in the following step to confirm that the Microsoft Intune connection is set to On.

    Screen shot that shows the patch to open the Microsoft Defender Security Center.

  3. In Microsoft Defender portal (previously the Microsoft Defender Security Center):

    1. Select Settings > Endpoints >Advanced features.

    2. For Microsoft Intune connection, choose On:

      Screen shot of the Microsoft Intune connection setting.

    3. Select Save preferences.

    Note

    Once the connection is established, the services are expected to sync with each other at least once every 24 hours. The number of days without sync until the connection is considered unresponsive is configurable in the Microsoft Intune admin center. Select Endpoint security > Microsoft Defender for Endpoint > Number of days until partner is unresponsive

  4. Return to Microsoft Defender for Endpoint page in the Microsoft Intune admin center.

    1. To use Defender for Endpoint with compliance policies, configure the following under Compliance policy evaluation for the platforms you support:

      • Set Connect Android devices to Microsoft Defender for Endpoint to On
      • Set Connect iOS/iPadOS devices to Microsoft Defender for Endpoint to On
      • Set Connect Windows devices to Microsoft Defender for Endpoint to On

      When these configurations are On, applicable devices that you manage with Intune, and devices you enroll in the future, are connected to Microsoft Defender for Endpoint for compliance.

      For iOS devices, Defender for Endpoint also supports the following settings that help provide the Vulnerability Assessment of apps on Microsoft Defender for Endpoint for iOS. For more information about using the following two settings, see Configure vulnerability assessment of apps.

      • Enable App Sync for iOS Devices: Set to On to allow Defender for Endpoint to request metadata of iOS applications from Intune to use for threat analysis purposes. The iOS device must be MDM-enrolled and provide updated app data during device check-in.

      • Send full application inventory data on personally owned iOS/iPadOS Devices: This setting controls the application inventory data that Intune shares with Defender for Endpoint when Defender for Endpoint syncs app data and requests the app inventory list.

        When set to On, Defender for Endpoint can request a list of applications from Intune for personally owned iOS/iPadOS devices. This list includes unmanaged apps and apps that were deployed through Intune.

        When set to Off, data about unmanaged apps isn’t provided. Intune does share data for the apps that were deployed through Intune.

      For more information, see Mobile Threat Defense toggle options.

    2. To use Defender for Endpoint with app protection policies for Android and iOS/iPadOS, configure the following under App protection policy evaluation for the platforms you use:

      • Set Connect Android devices to Microsoft Defender for Endpoint to On.
      • Set Connect iOS/iPadOS devices to Microsoft Defender for Endpoint on to On.

    To set up an integration Microsoft Defender for Endpoint for compliance and app protection policy evaluation, you must have a role that includes Read and Modify for the Mobile Threat Defense permission in Intune. The Endpoint Security Manager built-in admin role for Intune has these permissions included. For more information about both MDM Compliance Policy Settings and App Protection Policy Settings, see Mobile Threat Defense toggle options.

  5. Select Save.

Tip

When you integrate a new application to Intune Mobile Threat Defense and enable the connection to Intune, Intune creates a classic conditional access policy, such as Windows Defender ATP device policy, in Microsoft Entra ID. Each MTD app you integrate, including Microsoft Defender for Endpoint or any of our additional MTD partners, creates a new classic conditional access policy. These policies can be ignored, but should not be edited, deleted, or disabled.

If the classic policy is deleted, you will need to delete the connection to Intune that was responsible for its creation, and then set it up again. This recreates the classic policy. It's not supported to migrate classic policies for MTD apps to the new policy type for conditional access.

Classic conditional access policies for MTD apps:

  • Are used by Intune MTD to require that devices are registered in Microsoft Entra ID so that they have a device ID before communicating to MTD partners. The ID is required so that devices and can successfully report their status to Intune.
  • Have no effect on any other Cloud apps or Resources.
  • Are distinct from conditional access policies you might create to help manage MTD.
  • By default, don't interact with other conditional access policies you use for evaluation.

To view classic Conditional Access policies, in Azure, go to Microsoft Entra ID > Conditional Access > Classic policies.

Onboard devices

When you enable support for Microsoft Defender for Endpoint in Intune, you established a service-to-service connection between Intune and Microsoft Defender for Endpoint. You can then onboard devices you manage with Intune to Microsoft Defender for Endpoint. Onboarding enables collection of data about device risk levels.

When onboarding devices, be sure to use the most recent version of Microsoft Defender for Endpoint for each platform.

Onboard Windows devices

  • Endpoint detection and response (EDR) policy. The Microsoft Defender for Endpoint page in the Intune admin center includes a link that directly opens the EDR policy creation workflow, which is part of endpoint security in Intune.

    Use EDR policies to configure device security without the overhead of the larger body of settings found in device configuration profiles. You can also use EDR policy with tenant attached devices, which are devices you manage with Configuration Manager.

    When you configure EDR policy after connecting Intune to Defender, the policy setting Microsoft Defender for Endpoint client configuration package type has a new configuration option: Auto from connector. With this option, Intune automatically gets the onboarding package (blob) from your Defender for Endpoint deployment, replacing the need to manually configure an Onboard package.

  • Device configuration policy. When creating a device configuration policy to onboard Windows devices, select the Microsoft Defender for Endpoint template. When you connected Intune to Defender, Intune received an onboarding configuration package from Defender. This package is used by the template to configure devices to communicate with Microsoft Defender for Endpoint services and to scan files and detect threats. The onboarded devices also report their risk level to Microsoft Defender for Endpoint based on your compliance policies. After onboarding a device using the configuration package, you don't need to do it again.

  • Group policy or Microsoft Configuration Manager. Onboard Windows machines using Microsoft Configuration Manager has more details on the Microsoft Defender for Endpoint settings.

Tip

When using multiple policies or policy types like device configuration policy and endpoint detection and response policy to manage the same device settings (such as onboarding to Defender for Endpoint), you can create policy conflicts for devices. To learn more about conflicts, see Manage conflicts in the Manage security policies article.

Create the device configuration profile to onboard Windows devices

  1. Sign in to the Microsoft Intune admin center.

  2. Select Endpoint security > Endpoint detection and response > Create Policy.

  3. For Platform, select Windows 10, Windows 11, and Windows Server.

  4. For Profile type, select Endpoint detection and response, and then select Create.

  5. On the Basics page, enter a Name and Description (optional) for the profile, then choose Next.

  6. On the Configuration settings page, configure the following options for Endpoint Detection and Response:

    • Microsoft Defender for Endpoint client configuration package type: Select Auto from connector to use the onboarding package (blob) from your Defender for Endpoint deployment. If you are onboarding to a different or disconnected Defender for Endpoint deployment, select Onboard and paste the text from the WindowsDefenderATP.onboarding blob file into the Onboarding (Device) field.
    • Sample Sharing: Returns or sets the Microsoft Defender for Endpoint Sample Sharing configuration parameter.
    • [Deprecated] Telemetry Reporting Frequency: For devices that are at high risk, Enable this setting so it reports telemetry to the Microsoft Defender for Endpoint service more frequently.

    Screen shot of the configuration options for Endpoint Detection and Response.

    Note

    The preceding screen capture shows your configuration options after you’ve configured a connection between Intune and Microsoft Defender for Endpoint. When connected, the details for the onboarding and offboarding blobs are automatically generated and transfer to Intune.

    If you haven’t configured this connection successfully, the setting Microsoft Defender for Endpoint client configuration package type only includes options to specify onboard and offboard blobs.

  7. Select Next to open the Scope tags page. Scope tags are optional. Select Next to continue.

  8. On the Assignments page, select the groups that will receive this profile. For more information on assigning profiles, see Assign user and device profiles.

    When you deploy to user groups, a user must sign in on a device before the policy applies and the device can onboard to Defender for Endpoint.

    Select Next.

  9. On the Review + create page, when you're done, choose Create. The new profile is displayed in the list when you select the policy type for the profile you created. OK, and then Create to save your changes, which creates the profile.

Onboard macOS devices

After you establish the service-to-service connection between Intune and Microsoft Defender for Endpoint, you can onboard macOS devices to Microsoft Defender for Endpoint. Onboarding configures devices to communicate with Microsoft Defender Endpoint, which then collects data about devices risk level.

For configuration guidance for Intune, see Microsoft Defender for Endpoint for macOS.

For more information about Microsoft Defender for Endpoint for Mac including what's new in the latest release, see Microsoft Defender for Endpoint for Mac in the Microsoft 365 security documentation.

Onboard Android devices

After you establish the service-to-service connection between Intune and Microsoft Defender for Endpoint, you can onboard Android devices to Microsoft Defender for Endpoint. Onboarding configures devices to communicate with Defender for Endpoint, which then collects data about the devices risk level.

There isn't a configuration package for devices that run Android. Instead, see Overview of Microsoft Defender for Endpoint for Android in the Microsoft Defender for Endpoint documentation for the prerequisites and onboarding instructions for Android.

For devices that run Android, you can also use Intune policy to modify Microsoft Defender for Endpoint on Android. For more information, see Microsoft Defender for Endpoint web protection.

Onboard iOS/iPadOS devices

After you establish the service-to-service connection between Intune and Microsoft Defender for Endpoint, you can onboard iOS/iPadOS devices to Microsoft Defender for Endpoint. Onboarding configures devices to communicate with Defender for Endpoint, which then collects data about the devices risk level.

There isn't a configuration package for devices that run iOS/iPadOS. Instead, see Overview of Microsoft Defender for Endpoint for iOS in the Microsoft Defender for Endpoint documentation for prerequisites and onboarding instructions for iOS/iPadOS.

For devices that run iOS/iPadOS (in Supervised Mode), there's specialized ability given the increased management capabilities provided by the platform on these types of devices. To take advantage of these capabilities, the Defender app needs to know if a device is in Supervised Mode. Intune allows you to configure the Defender for iOS app through an App Configuration policy (for managed devices) that should be targeted to all iOS Devices as a best practice. For more information, see Complete deployment for supervised devices.

  1. Sign in to the Microsoft Intune admin center.

  2. Select Apps > App configuration policies > + Add, and then selectManaged devices from the drop down list.

  3. On the Basics page, enter a Name and Description (optional) for the profile, select Platform as iOS/iPadOS then choose Next.

  4. Select Targeted app as Microsoft Defender for iOS.

  5. On the Settings page, set the Configuration key as issupervised, then Value type as string with the {{issupervised}} as the Configuration value.

  6. Select Next to open the Scope tags page. Scope tags are optional. Select Next to continue.

  7. On the Assignments page, select the groups that will receive this profile. For this scenario, it's a best practice to target All Devices. For more information on assigning profiles, see Assign user and device profiles.

    When deploying policy to user groups, a user must sign-in on a device before the policy applies.

    Select Next.

  8. On the Review + create page, when you're done, choose Create. The new profile is displayed in the list of configuration profiles.

Further, for devices that run iOS/iPadOS (in Supervised Mode), the Defender for iOS team has made available a custom .mobileconfig profile to deploy to iPad/iOS devices. The .mobileconfig profile is used to analyze network traffic to ensure a safe browsing experience - a feature of Defender for iOS.

  1. Download the .mobile profile, which is hosted here: https://aka.ms/mdatpiossupervisedprofile.

  2. Sign in to the Microsoft Intune admin center.

  3. Select Devices > Configuration > On the Policies tab, select + Create.

  4. For Platform, select iOS/iPadOS

  5. For Profile type, select Custom, and then select Create.

  6. On the Basics page, enter a Name and Description (optional) for the profile, then choose Next.

  7. Enter a Configuration profile name, and select a .mobileconfig file to Upload.

  8. Select Next to open the Scope tags page. Scope tags are optional. Select Next to continue.

  9. On the Assignments page, select the groups that will receive this profile. For this scenario, it's a best practice to target All Devices. For more information on assigning profiles, see Assign user and device profiles.

    When you deploy to user groups, a user must sign in on a device before the policy applies.

    Select Next.

  10. On the Review + create page, when you're done, choose Create. The new profile is displayed in the list of configuration profiles.

View the count of devices that are onboarded to Microsoft Defender for Endpoint

To view the onboarded devices from Microsoft Defender for Endpoint within the Microsoft Defender for Endpoint connector page, you need an Intune role that includes Read for the Microsoft Defender Advanced Threat Protection permission.

Sample view of the onboarded device report.

Create and assign compliance policy to set device risk level

For Android, iOS/iPadOS, and Windows devices, the compliance policy determines the level of risk that you consider as acceptable for a device.

If you're not familiar with creating compliance policy, reference the Create a policy procedure from the Create a compliance policy in Microsoft Intune article. The following information is specific to configuring Microsoft Defender for Endpoint as part of a compliance policy.

  1. Sign in to the Microsoft Intune admin center.

  2. Select Devices > Compliance. On the Policies tab, select + Create policy.

  3. For Platform, use the drop-down box to select one of the following options:

    • Android device administrator
    • Android Enterprise
    • iOS/iPadOS
    • Windows 10 and later

    Next, select Create.

  4. On the Basics tab, specify a Name that helps you identify this policy later. You can also choose to specify a Description.

  5. On the Compliance settings tab, expand the Microsoft Defender for Endpoint category and set the option Require the device to be at or under the machine risk score to your preferred level.

    Threat level classifications are determined by Microsoft Defender for Endpoint.

    • Clear: This level is the most secure. The device can't have any existing threats and still access company resources. If any threats are found, the device is evaluated as noncompliant. (Microsoft Defender for Endpoint uses the value Secure.)
    • Low: The device is compliant if only low-level threats exist. Devices with medium or high threat levels aren't compliant.
    • Medium: The device is compliant if the threats found on the device are low or medium. If high-level threats are detected, the device is determined as noncompliant.
    • High: This level is the least secure and allows all threat levels. Devices with high, medium, or low threat levels are considered compliant.
  6. Complete the configuration of the policy, including assignment of the policy to applicable groups.

Create and assign app protection policy to set device risk level

Use the procedure to create an application protection policy for either iOS/iPadOS or Android, and use the following information on the Apps, Conditional launch, and Assignments pages:

  • Apps: Select the apps you wish to be targeted by app protection policies. For this feature set, these apps are blocked or selectively wiped based on device risk assessment from your chosen Mobile Threat Defense vendor.

  • Conditional launch: Below Device conditions, use the drop-down box to select Max allowed device threat level.

    Options for the threat level Value:

    • Secured: This level is the most secure. The device can't have any threats present and still access company resources. If any threats are found, the device is evaluated as noncompliant.
    • Low: The device is compliant if only low-level threats are present. Anything higher puts the device in a noncompliant status.
    • Medium: The device is compliant if the threats found on the device are low or medium level. If high-level threats are detected, the device is determined as noncompliant.
    • High: This level is the least secure and allows all threat levels, using Mobile Threat Defense for reporting purposes only. Devices are required to have the MTD app activated with this setting.

    Options for Action:

    • Block access
    • Wipe data
  • Assignments: Assign the policy to groups of users. The devices used by the group's members are evaluated for access to corporate data on targeted apps via Intune app protection.

Important

If you create an app protection policy for any protected app, the device's threat level is assessed. Depending on the configuration, devices that don’t meet an acceptable level are either blocked or selectively wiped through conditional launch. If blocked, they are prevented from accessing corporate resources until the threat on the device is resolved and reported to Intune by the chosen MTD vendor.

Create a conditional access policy

Conditional access policies can use data from Microsoft Defender for Endpoint to block access to resources for devices that exceed the threat level you set. You can block access from the device to corporate resources, such as SharePoint or Exchange Online.

Tip

Conditional Access is a Microsoft Entra technology. The Conditional Access node found in the Microsoft Intune admin center is the node from Microsoft Entra.

  1. Sign in to the Microsoft Intune admin center.

  2. Select Endpoint security > Conditional access > Create new policy. Because Intune presents the policy creation user interface for Conditional Access from the Azure portal, the interface is different than the policy creation workflow you might be familiar with.

  3. Enter a policy Name.

  4. For Users, use the Include and Exclude tabs to configure groups that will receive this policy.

  5. For Target resources, set Select what this policy applies to to Cloud apps, and then choose which apps to protect. For example, choose Select apps and then for Select, search for and select Office 365 SharePoint Online and Office 365 Exchange Online.

  6. For Conditions, select Client apps and then set Configure to Yes. Next, select the checkboxes for Browser and Mobile apps and desktop clients. Then, select Done to save the client app configuration.

  7. For Grant, configure this policy to apply based on device compliance rules. For example:

    1. Select Grant access.
    2. Select the checkbox for Require device to be marked as compliant.
    3. Select Require all the selected controls. Choose Select to save the Grant configuration.
  8. For Enable policy, select On and then Create to save your changes.

Next steps

Learn more from the Intune documentation:

Learn more from the Microsoft Defender for Endpoint documentation: